Matches in SemOpenAlex for { <https://semopenalex.org/work/W651405251> ?p ?o ?g. }
Showing items 1 to 66 of
66
with 100 items per page.
- W651405251 abstract "Preface Dedication Acknowledgements Introduction Chapter One: Malicious Code Overview Why Malicious Code Attacks are Dangerous The Impact of Malicious Code Attacks on Corporate Security Why Malicious Code Attacks Work Flaws in Software Weaknesses in System and Network Configurations Social Engineering Human Error and Foolishness Hackers, Thieves, and Spies Action Steps to Combat Malicious Code Attacks Chapter Two: Types of Malicious Code Email Viruses Trojans Back Doors Worms Blended Threats Time Bombs Spy Ware Ad Ware Steal Ware Action Steps to Combat Malicious Code Attacks Chapter Three: Review of Malicious Code Incidents Historic Tidbits The Morris Worm Melissa Love Bug Code Red(s) SirCam Nimda Slammer The Summer of 2003 Barrage of Blaster, Sobig and More Early 2004 with MyDoom, Netsky and More Action Steps to Combat Malicious Code Attacks Chapter Four: Basic Steps to Combat Malicious Code Understanding The Risks Using Security Policies to Set Standards System and Patch Updates Establishing a Computer Incident Response Team Training for IT Professionals Training End Users Applying Social Engineering Methods in an Organization Working with Law Enforcement Agencies Action Steps to Combat Malicious Code Attacks Chapter Five: Organizing for Security, Prevention, and Response Organization of the IT Security Function Where Malicious Code Prevention fits Into the IT Security Function Staffing for Malicious Code Prevention in IT Budgeting for Malicious Code Prevention Evaluating Products for Malicious Code Prevention Establishing and Utilizing an Alert Systems Establishing and Utilizing a Reporting System Corporate Security and Malicious Code Incident Investigations Action Steps to Combat Malicious Code Attacks Chapter Six: Controlling Computer Behavior of Employees Policies on Appropriate Use of Corporate Systems Monitoring Employee Behavior Site Blockers and Internet Filters Cookie and Spyware Blockers Pop Up Blockers Controlling Downloads SPAM Control Action Steps to Combat Malicious Code Attacks Chapter Seven: Responding to a Malicious Code Incident The First Report of a Malicious Code Attack The Confirmation Process Mobilizing the Response Team Notifying Management Using an Alert system and Informing End-Users Clean up and Restoration Controlling and Capturing Malicious Code Identifying the Source of Malicious Code The Preservation of Evidence When to Call Law Enforcement Enterprise Wide Eradication Returning to Normal Operations Analyzing Lessons Learned Action Steps to Combat Malicious Code Attacks Chapter Eight: Model Training Program for End-Users Explaining why The Training is Important Explaining The Appropriate Use Policy for Computers and Networks Explaining How the Help Desk and PC Support of the Organization Works Covering the Basic Dos and Donts of Computer Usage to Prevent Attacks Providing Basic Information about Malicious Code Explaining How it Identify Potentially Malicious Code Explaining What Employees Should to do if They Suspect Code is Malicious Explaining What Employees Should Expect From the IT Department During Incident Response. Performing the Administrative Aspects of a Training Program Action Steps to Combat Malicious Code Attacks Chapter Nine: The Future of Malicious Code Military Style Information Warfare Open Source Information Warfare Militancy and Social Action Homeland Security Efforts Action Steps to Combat Malicious Code Attacks Index Appendix A: Computer Security Resources" @default.
- W651405251 created "2016-06-24" @default.
- W651405251 creator A5069246840 @default.
- W651405251 date "2004-08-30" @default.
- W651405251 modified "2023-09-24" @default.
- W651405251 title "Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code" @default.
- W651405251 hasPublicationYear "2004" @default.
- W651405251 type Work @default.
- W651405251 sameAs 651405251 @default.
- W651405251 citedByCount "16" @default.
- W651405251 countsByYear W6514052512012 @default.
- W651405251 countsByYear W6514052512013 @default.
- W651405251 countsByYear W6514052512015 @default.
- W651405251 countsByYear W6514052512017 @default.
- W651405251 countsByYear W6514052512021 @default.
- W651405251 crossrefType "book" @default.
- W651405251 hasAuthorship W651405251A5069246840 @default.
- W651405251 hasConcept C121332964 @default.
- W651405251 hasConcept C127413603 @default.
- W651405251 hasConcept C177264268 @default.
- W651405251 hasConcept C199360897 @default.
- W651405251 hasConcept C2776760102 @default.
- W651405251 hasConcept C2780791683 @default.
- W651405251 hasConcept C38652104 @default.
- W651405251 hasConcept C41008148 @default.
- W651405251 hasConcept C62520636 @default.
- W651405251 hasConcept C70118762 @default.
- W651405251 hasConcept C86844869 @default.
- W651405251 hasConceptScore W651405251C121332964 @default.
- W651405251 hasConceptScore W651405251C127413603 @default.
- W651405251 hasConceptScore W651405251C177264268 @default.
- W651405251 hasConceptScore W651405251C199360897 @default.
- W651405251 hasConceptScore W651405251C2776760102 @default.
- W651405251 hasConceptScore W651405251C2780791683 @default.
- W651405251 hasConceptScore W651405251C38652104 @default.
- W651405251 hasConceptScore W651405251C41008148 @default.
- W651405251 hasConceptScore W651405251C62520636 @default.
- W651405251 hasConceptScore W651405251C70118762 @default.
- W651405251 hasConceptScore W651405251C86844869 @default.
- W651405251 hasLocation W6514052511 @default.
- W651405251 hasOpenAccess W651405251 @default.
- W651405251 hasPrimaryLocation W6514052511 @default.
- W651405251 hasRelatedWork W1516960038 @default.
- W651405251 hasRelatedWork W1595564425 @default.
- W651405251 hasRelatedWork W1968519345 @default.
- W651405251 hasRelatedWork W1988819861 @default.
- W651405251 hasRelatedWork W2182052627 @default.
- W651405251 hasRelatedWork W2351518152 @default.
- W651405251 hasRelatedWork W2364132823 @default.
- W651405251 hasRelatedWork W2366434478 @default.
- W651405251 hasRelatedWork W2481744746 @default.
- W651405251 hasRelatedWork W2486441280 @default.
- W651405251 hasRelatedWork W2520827446 @default.
- W651405251 hasRelatedWork W2625166341 @default.
- W651405251 hasRelatedWork W2894268960 @default.
- W651405251 hasRelatedWork W2912192668 @default.
- W651405251 hasRelatedWork W2941177851 @default.
- W651405251 hasRelatedWork W3026056695 @default.
- W651405251 hasRelatedWork W3093399276 @default.
- W651405251 hasRelatedWork W3133591144 @default.
- W651405251 hasRelatedWork W3176608074 @default.
- W651405251 hasRelatedWork W2850426121 @default.
- W651405251 isParatext "false" @default.
- W651405251 isRetracted "false" @default.
- W651405251 magId "651405251" @default.
- W651405251 workType "book" @default.